Search results for "Service provider"

showing 10 items of 129 documents

The impact of service bundles on the mechanism through which functional value and price value affect WOM intent

2017

Purpose The purpose of this paper is to contribute toward the current limited understanding of service bundles by investigating how purchasers of combined product-service bundles (bundle customers) differ from those purchasing a product and associated service separately (non-bundle customers). Design/methodology/approach The hypothesized effects were tested on a representative sample of mobile phone subscribers in Finland, through a multi-group moderated analysis using variance-based structural equation modeling. Findings While functional value had a stronger effect on attitude for bundle customers, price value is a stronger determinant of attitude for non-bundle customers. There was no di…

Service (business)service bundlesmental accountingpalvelutMental accountingarvonluontiStrategy and Management05 social sciencesWord of mouthprospect theoryService providerPurchasingProspect theoryTourism Leisure and Hospitality ManagementBundle0502 economics and businessValue (economics)asiakaskokemusBusiness Management and Accounting (miscellaneous)050211 marketingBusinessword of mouthMarketing050203 business & managementengagementJournal of Service Management
researchProduct

UWSIO: Towards automatic orchestration for the deployment of 5G monitoring services from bare metal

2018

The next generation mobile networks 5G are currently being intensively developed and standardized globally, with commercial prototyping 5G connections already emerging. At the 5G system level, one of the Key Performance Indicators (KPIs) defining 5G is substantially reduced service creation time for 5G network operators and/or service providers to increase the system efficiency and thus reduce operational costs. In this work, we focus on realize this challenging KPI in terms of speedy creation of monitoring services for 5G operators from scratch (no operating system pre-installed). A new 5G infrastructure orchestrator UWSIO is proposed to achieve fully automated deployment of 5G monitoring …

Service (systems architecture)Computer sciencebusiness.industryTestbed020206 networking & telecommunications020207 software engineeringCloud computing02 engineering and technologyService providerSoftware deployment0202 electrical engineering electronic engineering information engineeringOrchestrationPerformance indicatorOrchestration (computing)businessSoftware engineeringNext Generation Mobile Networks2018 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Privacy-preserving data allocation in decentralized online social networks

2016

International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…

Service (systems architecture)ExploitComputer sciencePrivacy policyControl (management)02 engineering and technologyPeer-to-peercomputer.software_genreComputer securityTheoretical Computer ScienceSet (abstract data type)[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Privacy policySocial networkSettore INF/01 - Informaticabusiness.industryComputer Science (all)020206 networking & telecommunicationsService providerDecentralized online social network Data availability Privacy policy Peer-to-peerData availabilityPeer-to-peerDecentralized online social network020201 artificial intelligence & image processingbusinesscomputerComputer network
researchProduct

Joint Radio and Computational Resource Allocation in IoT Fog Computing

2018

The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…

Service (systems architecture)IoTEdge deviceComputer Networks and CommunicationsComputer scienceDistributed computingAerospace Engineeringresource allocationCloud computing02 engineering and technologyresursointiComputational resource0203 mechanical engineeringUser experience design0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringstudent project allocationmatching theoryta113ta213business.industry020302 automobile design & engineering020206 networking & telecommunicationsService providerAutomotive EngineeringResource allocationEnhanced Data Rates for GSM Evolutionfog computingbusinessIEEE Transactions on Vehicular Technology
researchProduct

Which Test Artifacts Testing Service Providers should Reuse and How? Experiences from a Case Study in the Chinese ICT Sourcing Market

2011

Software testing service providers are facing new requirements to shorten service times, lower costs, and increase service customization and quality. Reuse of test artifacts is a possible solution that can help providers to meet the requirements because reuse can improve software quality and productivity. However, the extant literature does not explain in depth which test artifacts should be reused and how. This paper focuses on ICT-enabled sourcing of software testing services in the Chinese market to identify the most important reusable test artifacts. There are two reasons for this research. First, most Chinese service providers are small or medium-sized and have to overcome obstacles su…

Service (systems architecture)Process managementComputer scienceSoftware walkthroughReuseSoftware peer reviewGlobalizationSoftware quality analystSoftware verification and validationMarketingta113Social software engineeringbusiness.industrySoftware as a serviceSoftware developmentService providerSoftware qualityInformation and Communications TechnologySoftware deploymentPersonal software processSoftware quality managementPackage development processbusinessSystem integration testingSoftware project managementSoftware quality control
researchProduct

Software-as-a-Service in the Telecommunication Industry: Problems and Opportunities

2010

This paper examines the telecommunication software market and the adoption of topical Software-as-a-Service (SaaS) model in this vertical market. The aim of this paper is to estimate which telecommunication software products are likely to be provided as a Service, and to examine the potential factors disallowing SaaS adoption. The set aim is pursued by studying both the supplying software vendors and the communication service providers (CSP) as customers. A set of thematic interviews, software industry statistics and information disclosed by the software vendors are used in the analysis. The results of the analysis reveal challenges in adopting SaaS for telecommunication software as well as…

Service (systems architecture)Social software engineeringProcess managementbusiness.industrySoftware deploymentInformationSystems_INFORMATIONSYSTEMSAPPLICATIONSSoftware as a serviceSoftware developmentVertical marketSoftware systemService providerbusinessTelecommunications
researchProduct

Inter-provider AAA and Billing of VoIP Users with Token-based Method

2007

With the increasing popularity of wireless LAN technology, providers of real-time voice over IP (VoIP) services, known as voice service providers (VSP), are asking for roaming solutions and AAA (Authentication, Authorization and Accounting) methods that allow users to use their services from any available public Internet access network. In this paper we propose an AAA and billing architecture that allows users of VSPs to have access to the Internet from wired and wireless access networks provided by both traditional carriers, such as 3G providers, and wireless local access network (WLAN) providers. We propose a token-based AAA method that allows users of VoIP services to have their VSPs as …

Session Initiation ProtocolAccess networkbusiness.product_categoryVoice over IPbusiness.industrycomputer.internet_protocolComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSService providerComputer securitycomputer.software_genreSecurity Assertion Markup LanguageInternet accessThe InternetRoamingbusinesscomputerComputer network2007 First International Global Information Infrastructure Symposium
researchProduct

Smart Auctions for Autonomic Ambient Intelligence Systems

2020

The main goal of Ambient Intelligence (AmI) is to support users in their daily activities by satisfying and anticipating their needs. To achieve such goal, AmI systems rely on physical infrastructures made of heterogenous sensing devices which interact in order to exchange information and perform monitoring tasks. In such a scenario, a full achievement of AmI vision would also require the capability of the system to autonomously check the status of the infrastructure and supervise its maintenance. To this aim, in this paper, we extend some previous works in order to allow the self-management of AmI devices enabling them to directly interact with maintenance service providers. In particular,…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceAmbient IntelligenceComputer sciencebusiness.industryMulti-agent systemSmart Contracts.020206 networking & telecommunications02 engineering and technologyTrusted ComputingService providerTrusted third partyComputer securitycomputer.software_genreMaintenance engineeringHome automation0202 electrical engineering electronic engineering information engineeringCommon value auction020201 artificial intelligence & image processingbusinesscomputer2020 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

Reputation Management for Distributed Service-Oriented Architectures

2010

Nowadays, several network applications require that consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented Architecture (SOA) be augmented in order to support the declaration of this information. The correct behavior of such new SOA platforms, however, will depend on the presence of some mechanisms that allow consumer nodes to evaluate trustworthiness of service providers. This work proposes a new…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)Distributed SOAbusiness.industryComputer sciencecomputer.internet_protocolQuality of servicemedia_common.quotation_subjectMobile QoSService-oriented architectureService providercomputer.software_genreComputer securityQoS-based Service SelectionThe InternetReputation ManagementWeb servicebusinesscomputerComputer networkReputationmedia_common2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop
researchProduct

La libertà di informazione nell’era di Internet

2018

Il mercato dell’informazione e il regime della libertà di manifestazione del pensiero hanno subito ingenti mutamenti nell'era di internet, determinando fra l'altro la crisi dei media. Lo studio approfondisce i modelli attraverso i quali vengono selezionate le informazioni on line e quelli di distribuzione delle stesse ed evidenzia i rischi derivanti dalle fake news e dagli hate speach, che soffocano il "mercato delle idee" e della informazione, concludendo con una riflessione sulle possibilità di regolazione del fenomeno.

Settore IUS/08 - Diritto CostituzionaleInternet libertà di espressione fake news hate speech Internet service provider
researchProduct